US20040064725A1 - Method and system for detecting a communication problem in a computer network - Google Patents

Method and system for detecting a communication problem in a computer network Download PDF

Info

Publication number
US20040064725A1
US20040064725A1 US10/246,156 US24615602A US2004064725A1 US 20040064725 A1 US20040064725 A1 US 20040064725A1 US 24615602 A US24615602 A US 24615602A US 2004064725 A1 US2004064725 A1 US 2004064725A1
Authority
US
United States
Prior art keywords
computer
data packets
router
information
network link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/246,156
Inventor
Venkata Padmanabhan
Daniel Simon
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US10/246,156 priority Critical patent/US20040064725A1/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SIMON, DANIEL R., PADMANABHAN, VENKATA N.
Publication of US20040064725A1 publication Critical patent/US20040064725A1/en
Priority to US12/193,277 priority patent/US8001605B2/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Definitions

  • the invention relates generally to network communications and, more particularly, to detecting communication problems that result from one or more devices failing, either through malfunction or through malice, to properly forward data packets to other devices.
  • Protocols do exist to facilitate routing in computer networks.
  • BGP Border Gateway Protocol
  • S-BGP Secure BGP
  • S-BGP Secure BGP
  • Another proposed approach is to maintain a centralized registry of “plausibility” information about routing advertisements, so that blatantly invalid advertisements can be discounted when received.
  • This approach can prevent the most egregious routing problems that arise from router misconfigurations, but it is still vulnerable to a wide range of both inadvertent and malicious false advertisements for routes that a particular router may be “entitled” to advertise, but cannot in fact serve.
  • a method and system for detecting a communication problem in a computer network runs a verification procedure in which it sends data packets to another computer in the network. Some or all of the data packets contain, either individually or collectively, a secret piece of information, such as a secret code.
  • the computer then makes a determination regarding the network links between it and the other computer. If, for example, the other computer is able to respond by providing the secret piece of information back, then the computer sending the data packets concludes that the devices along the network links en route to the other computer are properly forwarding data packets.
  • FIG. 1 illustrates an example of a computer network in which the invention may be practiced
  • FIG. 2 illustrates an example of a computer on which at least some parts of the invention may be implemented
  • FIG. 3 illustrates a network on which a verification procedure may be performed according to an embodiment of the invention.
  • FIG. 4 illustrates a procedure that is followed when a router conducts an investigation in accordance with an embodiment of the invention.
  • FIG. 5 illustrates an example of a network on which a router may conduct an investigation in accordance with an embodiment of the invention.
  • the invention is generally directed to a method and system for detecting a communication problem on a computer network.
  • the invention can be used in a variety of contexts.
  • the invention can be used to detect faulty or malicious routing in a network.
  • a computer tests network links by transmitting data packets to a receiving computer over the network links.
  • the data packets either individually or collectively, contain a piece of information that is secret, both in terms of its existence and in terms of its content.
  • the secret piece of information may take a variety of forms.
  • the secret piece of information may be the number of data packets that contain a secret code
  • the secret piece of information may be a large number that can only be derived if the receiving computer knows a certain algorithm and is able to receive at least a certain percentage of the data packets.
  • the computer sending the data packets then makes a determination regarding the network links based on the response that the receiving computer sends back. If, for example, the receiving computer is able to reconstruct the secret piece of information and transmit it back, the computer concludes that the devices en route to the receiving computer are properly forwarding data packets.
  • program may connote a single program module or multiple program modules acting in concert.
  • includes any device that electronically executes one or more programs, such as personal computers (PCs), hand-held devices, multiprocessor systems, microprocessor-based programmable consumer electronics, network PCs, minicomputers, mainframe computers, consumer appliances having a microprocessor or microcontroller, routers, gateways, hubs and the like.
  • PCs personal computers
  • the invention may also be employed in distributed computing environments, where tasks are performed by remote processing devices that are linked through a communications network.
  • programs may be located in both local and remote memory storage devices.
  • the example network includes several computers 10 communicating with one another over a network 11 , represented by a cloud.
  • Network 11 may include many well-known components, such as routers, gateways, hubs, etc. and allows the computers 10 to communicate via wired and/or wireless media.
  • one or more of the computers may act as clients, servers or peers with respect to other computers. Accordingly, the various embodiments of the invention may be practiced on clients, servers, peers or combinations thereof, even though specific examples contained herein don't refer to all of these types of computers.
  • the computer 10 typically includes at least one processing unit 14 and memory 16 .
  • the processing unit 14 executes instructions to carry out tasks in accordance with various embodiments of the invention. In carrying out such tasks, the processing unit 14 may transmit electronic signals to other parts of the computer 10 and to devices outside of the computer 10 to cause some result.
  • the memory 16 may be volatile (such as RAM), non-volatile (such as ROM or flash memory) or some combination of the two. This most basic configuration is illustrated in FIG. 2 by dashed line 18 .
  • computer 10 may also include additional storage (removable and/or non-removable) including, but not limited to, magnetic or optical disks or tape.
  • Computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information, including computer-executable instructions, data structures, program modules, or other data.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory, CD-ROM, digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to stored the desired information and which can be accessed by the computer 10 . Any such computer storage media may be part of computer 10 .
  • Computer 10 may also contain communications connections that allow the device to communicate with other devices.
  • a communication connection is an example of a communication medium.
  • Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
  • communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media.
  • the term “computer-readable medium” as used herein includes both computer storage media and communication media.
  • Computer 10 may also have input devices such as a keyboard, mouse, pen, voice input device, touch input device, etc.
  • Output devices such as a display 20 , speakers, a printer, etc. may also be included. All these devices are well known in the art and need not be discussed at length here.
  • the computer network includes a first computer 30 , a second computer 32 , a third computer 34 , and a fourth computer 36 .
  • the computer network also includes a destination host 38 , which is, itself, a computer.
  • the first computer 30 communicates with the second computer 32 via a network link 40 .
  • the second computer 32 communicates with the third computer 34 via a network link 42 .
  • the third computer 34 communicates with the fourth computer 36 via a network link 44 .
  • the fourth computer 36 communicates with the destination host 38 via a network link 46 .
  • Each of the network links 40 - 46 of FIG. 3 may include a variety of types of communication media.
  • each of the computers of FIG. 3 is considered to be a part of each link to which it is adjacent.
  • the first computer 30 and the second computer 32 are each considered to be end nodes on the link 40 between them.
  • the second computer 32 and the third computer 34 are each considered to be end nodes on the link 42 between them.
  • the third computer 34 and the fourth computer 36 are each considered to be end nodes on the link 44 between them.
  • the fourth computer 36 and the destination host 38 are each considered to be end nodes on the link 46 between them.
  • Each of the network links 40 - 46 may also include other, intermediate computers that are not illustrated in FIG. 3.
  • the first computer 30 verifies whether each of the network links 40 - 46 between itself and the destination host 38 are functioning by performing a verification procedure. This verification procedure will now be described.
  • the first computer 30 establishes a secure communication session with the second computer 32 .
  • the first computer 30 indicates to the second computer 32 as to what information the second computer 32 needs to give to the first computer 30 in order to convince the first computer 30 that the second computer 32 is properly receiving data packets from the first computer 30 .
  • the information that the first computer 30 requires from the second computer 32 is secret. That is, the information cannot easily be discovered or computed by a third party.
  • the first computer 30 then sends a stream of data packets to the second computer 32 .
  • the second computer 32 analyzes information contained in the stream of packets and, based on the analysis, attempts to construct a correct response to the stream of packets. The second computer 32 then transmits what it believes to be the correct response back to the first computer 30 . If the response is correct, the first computer 30 deems the link 40 between the first computer 30 and the second computer 32 not to have any problems. In addition to the response, the second computer 32 informs the first computer 30 regarding the identity of the next computer on the way to the host, which, in this case, is the third computer 34 . The first computer 30 repeats this procedure with each subsequent computer in FIG. 3, until it has executed the procedure with the third computer 34 , the fourth computer 36 and the destination 38 , or until it encounters a problem.
  • the first computer 30 If the first computer 30 encounters a problem with one of the other computers, it deems the link between that computer and the computer immediately preceding it to have a problem. For example, if the first computer 30 does not receive a correct response to a stream of data packets from the third computer 34 , the first computer will designate the link 42 between the second and third computers to be a problem. Similarly, if the first computer 30 does not receive a correct response to a stream of data packets from the destination 38 , the first computer will designate the link 42 between the destination 38 and the fourth computer 36 to be a problem.
  • the stream of data packets sent by the first computer 30 does not have to originate from the first computer 30 itself, but may include packets that the first computer 30 received from another source, which are simply being forwarded by the first computer 30 .
  • the first computer 30 receives many data packets that are a part of the normal network data traffic, and identifies a subset of the packets based on some special property that the subset of has—either a collective property, or a property that each individual data packet of the subset ha—and forwards all of the data packets, including the subset, to the other computers of the network. Each of the other computers is then expected to be able to reconstruct the secret piece of information based on the special property of the subset of data packets.
  • the first computer 30 could start at the destination host 38 and work its way back.
  • the first computer 30 can determine whether it receives a correct response from one of the other computers 30 through 38 , depending on how the invention is implemented. Some example implementations will now be given, and, for the sake of clarity, will be described in the context of the first computer 30 executing the verification procedure with the third computer 34 . It will be assumed that the first computer 30 has already determined that the link 40 between the first computer 30 and the second computer 32 is not experiencing problems.
  • the first computer establishes a secure communication session with the third computer 34 and, during the secure communication session, gives the second computer a secret code that the second computer 32 needs to look for in future packets as well as an algorithm that the third computer needs in order to perform an analysis of the data packets having the secret code.
  • the code might be as simple as a bit pattern, or as complex as R n (mod P), where R n is one of a list of n randomly generated numbers that the first computer 30 gives to the third computer 34 and P is some prime number that the first computer 30 also gives to the third computer 34 .
  • the first computer 30 then ends the secure communication session with the third computer 34 .
  • the first computer 30 transmits a stream of data packets to the third computer 34 , a random number of which contain the code.
  • the first computer may, but need not, create the packets having the secret code.
  • the first computer identifies data packets that it received in the normal data traffic and that happen to have the secret code, performs an analysis on those data packets using the algorithm, saves the result of the algorithm as a predetermined “correct” answer, and forwards the identified data packets along with all of the other data packets to the third computer 34 via the second computer 32 .
  • the third computer 34 Upon receiving the data packets, the third computer 34 uses the algorithm it received from the first computer 30 to perform some sort of analysis, such as a probabilistic, statistical or cryptographic analysis, on those data packets having the secret code. For example, the algorithm may require the third computer 34 to compute a cryptographic checksum on a concatenation of all of the packets having the secret code.
  • An example of an algorithm that may be used for this purpose is the secure hash algorithm SHA-1.
  • the third computer 34 returns the result of its analysis to the first computer 30 .
  • the first computer 30 compares the result returned by the third computer 34 with the predetermined “correct” result.
  • the first computer deems the link 42 between the second computer 32 and the third computer 34 not to have problems. If the two values do not match or are outside an acceptable margin of error with respect to one another, then the first computer 30 designates the link 42 to have a problem. If the first computer 30 has to repeat this procedure with one of the other computers as when, for example, it does not find a problem with the link 42 between the second computer 32 and the third computer 34 , the first computer 30 chooses a different code.
  • the first computer 30 used the bit pattern 0011 as the code when carrying out the procedure with the third computer 34 , it might use the bit pattern 1101 when carrying out the procedure with the fourth computer 36 , and the bit pattern 1111 when carrying out the procedure with the destination host 38 .
  • the code could be in a particular field as specified by a security procedure known to both the first and second computers.
  • the first computer 30 might instruct the second computer 32 to look for the code in an unused portion of the IP header.
  • it could be understood beforehand by both the first computer 30 and the second computer 32 that the code that the first computer 30 provides to the second computer 32 during the secure communication session is to be looked for in first byte of the payload portion of the data packet.
  • the first computer 30 instructs the third computer 34 , during the secure communication session, how to reconstruct a secret piece of information, such as a 128-bit number, that is distributed among the data packets of the stream.
  • the first computer 30 might give the third computer 34 an algorithm for doing so.
  • the first computer 30 then breaks the piece of information down into parts, distributes those parts among multiple data packets, and sends the data packets to the third computer 34 .
  • the first computer then awaits a response from the third computer 34 .
  • the third computer 34 if it receives the data packets, extracts the constituent parts of the secret piece of information, reconstructs the secret piece of information, and transmits a response containing the secret piece of information to the first computer 30 .
  • the first computer 30 determines that the link 42 between the second computer 32 and the third computer 34 is not experiencing problems.
  • the nature of the secret piece of information may be such that it can be reconstructed with a certain percentage of the data packets.
  • the secret piece of information may be of a type that the third computer 34 can reconstruct if it receives 85% of the data packets.
  • the percentage of data packets needed to reconstruct the secret piece of information is between and inclusive of about 80% and about 90%.
  • the verification procedure described in conjunction with FIG. 3 can be used in a variety of contexts.
  • the verification procedure is used by a router as part of an investigation to determine whether or not there are any problems in various links of a network.
  • An example of the overall steps that a router takes during the course of such an investigation will now be described with reference to the flowchart of FIG. 4.
  • the router receives complaints from other computers on the network regarding a particular destination computer on the network. These complaints may take a variety of forms. For example, in standard TCP/IP communication, if an end host detects an end-to-end performance problem when sending data packets to a particular destination, it sets a “complaint bit” in subsequent data packets sent to that destination.
  • the router recognizes complaints at step 50 is by observing data packets that pass through it, that are bound for a particular destination and that also have the complaint bit set.
  • the router conducts an initial evaluation of the complaints. As part of this initial evaluation, the router uses some sort of mechanism to determine whether or not some or all of the complaints are real or are being faked. If the router determines that a sender of a complaint is, for example, setting a complaint bit in order to mislead, then the router takes no action regarding that sender's complaint and ignores future complaints from that sender. The router also evaluates the total volume of complaints from all sources. For example, if a router receives complaints from only a small fraction of end users attempting to reach a particular destination address, the router may choose to ignore those complaints as anomalous. If, at step 54 , the router determines that the complaints are not worth investigating, then the overall investigation ends. Otherwise, if most or all traffic sent to a particular destination suggests that there is a routing problem, the router will continue with the investigation at step 56 .
  • the router executes a traceroute procedure, sending traceroute packets to the destination that is the subject of the complaints.
  • Traceroute is a well-known procedure and, while there are several variations, it basically involves sending a traceroute packet to the first host that is upstream of the sender (the router is the sender, in this example).
  • the traceroute packet may be implemented as a normal UDP or ICMP packet with a limited time-to-live (TTL).
  • TTL time-to-live
  • the first upstream host responds to the sender by confirming that it has received the traceroute packet.
  • the first upstream host also decrements the TTL and forwards the traceroute packet to the next upstream host.
  • the next upstream host performs the same steps as the first upstream host.
  • step 58 the router determines that the traceroute procedure is successful, then the investigation proceeds to step 60 .
  • step 60 the router executes a verification procedure with each of the upstream routers on each of the hops that it knows about between itself and the destination. This verification procedure is executed in accordance with the invention, examples of which were described in conjunction with FIG. 3. If, at step 62 , the router determines that the verification procedure is successful with respect to each of the upstream routers on which the verification procedure is performed, then the investigation is complete, and the router concludes that it cannot accurately identify the link in the network that is having the problem.
  • step 64 the router executes a verification procedure on the first upstream router that failed to respond properly to the traceroute packet. Again, this verification procedure is executed in accordance with the invention, examples of which were described in conjunction with FIG. 3. The verification procedure is used to confirm the results of the traceroute procedure.
  • step 66 the router deems the link between the last router that responded properly to the verification procedure and the first router that failed to respond properly to be the problem link. The investigation then ends, and the router is free to take corrective action, such as by routing around the link that is determined to be a problem.
  • a computer network 92 includes a first router 70 , a second router 72 , a third router 74 , and a fourth router 76 are shown.
  • the network 92 also includes a destination host 78 , which is, itself, a computer, and a public key registry 90 , which contains the public key of each router in the network 92 .
  • Each of the routers represents a routing hop to the destination host 78 . Thus, there are four routing hops shown from the first router 70 to the destination host 78 .
  • the first router 70 communicates with the second router 72 via a network link 80 .
  • the second router 72 communicates with the third router 74 via a network link 82 .
  • the third router 74 communicates with the fourth router 76 via a network link 84 .
  • the fourth router 76 communicates with the destination host 78 via a network link 86 .
  • each network link shown in FIG. 5 includes the two nodes on either side of it and may include other computers that are not shown.
  • the second router 72 has been taken over by a malicious entity, labeled 88 , which does not forward data packets to other nodes on the network 92 , but which permits the second router 72 to respond correctly to traceroute packets sent to it, and even to mimic appropriate responses to traceroute packets sent to other entities.
  • the first router 70 has received complaints from other routers in the network 92 regarding the destination host 78 (step 50 ).
  • the first router 70 conducts an initial evaluation of the complaint (step 52 ). Based on the initial evaluation, the first router 70 determines whether or not to conduct a further investigation (step 54 ). If the first router 70 determines that further investigation is not warranted, the procedure ends.
  • the first router 70 executes a traceroute procedure for the destination host 78 .
  • the first router 70 sends traceroute packets to the second router 72 .
  • the second router 72 responds appropriately to the traceroute packets, and generates a set of bogus traceroute responses that mimics the responses that would be expected from the third router 74 , the fourth router 76 if the links 82 , 84 and 86 between the second and third routers, the third and fourth routers, and between the fourth router and the destination host were functioning correctly.
  • the first router 70 therefore determines that the traceroute procedure has succeeded (step 58 ).
  • the first router 70 then initiates a verification procedure in accordance with an embodiment of the invention (step 60 ).
  • the first router 70 looks up the public key of the second router 72 in the public key registry 90 . Using the second router's public key, the first router 70 establishes a secure communication session with the second router 72 . The first router 70 then gives an algorithm to the second router 72 and indicates to the second router 72 that the second router 72 needs to perform the algorithm using all data packets that it receives from the first router 70 that have the code 1101 in the most significant half of the first byte of payload. The first router 70 then terminates the secure session with the second router 72 , and sends the second router 72 a stream of 300 data packets, 100 of which have the code. The second router 72 correctly performs the algorithm on the 100 coded data packets, and replies to the first router 70 with the correct response. The first router 70 determines, based on the response, that the link 80 between the first router 70 and the second router 72 is not experiencing any problems.
  • the first router 70 looks up the public key of the third router 74 in the public key registry 90 . Using the third router's public key, the first router 70 attempts to establish a secure communication session with the third router 74 .
  • the second router 72 still under the control of the malicious entity 88 , and recognizing that first router 70 is attempting to establish a secure communication session with the third router 74 , permits the data packets that are involved in the secure communication session to reach the third router 74 .
  • the second router 72 also permits the third router 74 to respond to the first router 70 during the secure communication session, so as not to arouse suspicion.
  • the first router 70 then gives an algorithm to the third router 78 and indicates to the third router 74 that the third router 74 needs to perform the algorithm using all data packets that it receives from the first router 70 that have the code 1111 in the most significant half of the first byte of payload.
  • the first router 70 then terminates the secure session with the third router 74 .
  • the second router 72 under the control of the malicious entity 88 , ceases forwarding data packets.
  • the first router 70 sends the third router 74 a stream of 300 data packets, 50 of which have the code 1111. These data packets never reach the third router 74 .
  • the second router 72 not having been privy to the content of the secure communication session between the first router 70 and the third router 74 , does not know which data packets of the 300 are significant to the third router 74 , or what to do with the packets, and is not able to mimic an appropriate response.
  • the first router 70 determines, based on the lack of response from the third router 74 (or an incorrect bogus response from the second router 72 ), that the verification procedure has failed (step 62 ). Based on the point of failure, the first router 70 determines that the link 82 between the second router 72 and the third router 74 is experiencing problems (step 66 ). The first router 70 then takes corrective action, such sending future data packets to the third router 74 via a new route that excludes the link 82 between the second router 72 and the third router 74 .
  • a malicious router may adjust its disruptive behavior so as to avoid detection. It may, for example, confine its attacks to periods of time where it does not detect any attempts to initiate the verification procedure described above (i.e., does not detect key exchange packets from upstream routers).
  • routers wishing to thwart this attack can give occasional indications that they are initiating the verification procedure (such as by sending key exchange packets—whether real or bogus) whenever there is any hint of a problem.
  • the malicious router cannot distinguish real verification attempts from fictitious ones (beyond detecting the presence or absence of key exchanges), the presence of such simulations should ensure that misbehavior occurs either at such times when it can be detected by the verification procedure, or else not at all.
  • the malicious router may attempt to interfere with the verification procedure by selectively blackholing (dropping) the packets used in the key exchange phase, so as to give the impression that a router further downstream is not accepting key exchanges (and hence is either malfunctioning or malicious). This attack cannot be used by a single misbehaving router to frame a router further downstream.
  • misbehavior affects normal traffic
  • the verification procedure will correctly detect a misbehaving link when the (honest) router immediately downstream of the adversary on the path reports the anomalous traffic pattern.
  • two misbehaving routers could collude to frame a router between them on a path as follows: the downstream confederate disrupts traffic, while the upstream one disrupts key exchanges to the victim router so as to implicate it.
  • a countermeasure to this attack that may be used in an embodiment of the invention (if multiple colluding routers are deemed a threat, and if redundant routes are not being used to effect the key exchange) is to use so-called “onion routing” style encryption of key exchange messages.
  • each router that receives a message is able to decrypt just enough information to determine the next router to which the message is to be forwarded, but is not able to determine the destination of any further hops. Since the verification procedure described above involves a key exchange with each router along the path to the destination, the key exchange traffic can be encrypted hop by hop, so that each router along the route does not know the final destination of the message (and therefore cannot consistently frame a single router).

Abstract

A computer in a network runs a verification procedure in which it sends data packets to another computer in the network. Some or all of the data packets contain, either individually or collectively, a secret piece of information, such as a secret code. The computer then makes a determination regarding the network links between it and the other computer. If, for example, the other computer is able to respond by providing the secret piece of information back, then the computer sending the data packets concludes that the devices along the network links en route to the other computer are properly forwarding data packets.

Description

    TECHNICAL FIELD OF THE INVENTION
  • The invention relates generally to network communications and, more particularly, to detecting communication problems that result from one or more devices failing, either through malfunction or through malice, to properly forward data packets to other devices. [0001]
  • BACKGROUND
  • Communication problems in computer networks can result in the loss of data, time and money. Such problems stem from a variety of sources. One major source of communication problems is faulty or malicious routing. Faulty routing occurs when a device in a computer network fails, due to a malfunction, to properly forward data packets to other devices in the computer network. On the other hand, malicious routing is when a device in a computer network intentionally fails to forward data packets. [0002]
  • Protocols do exist to facilitate routing in computer networks. For example, one of the protocols currently employed on the Internet to assist devices in properly routing data packets is the Border Gateway Protocol (BGP). However, BGP includes no mechanism for verifying either the authenticity (the correct origin) or the accuracy of the routing information that it distributes. As a result, traffic on a network can be severely disrupted by routers announcing nonexistent routes, or simply failing to withdraw failed routes, as a result of either malfunction or malice. Two approaches have been suggested to solving this problem. One, Secure BGP (S-BGP), requires routing information to be digitally signed, so that routers advertising false routing information can be held accountable when detected. However, the overhead of a digital signature is large and possibly prohibitive, particularly when bringing a failed router back on line, at which time all routing advertisements for that router must be digitally signed at once. Furthermore, the management of the public-key infrastructure (PKI) that allows all routers to validate each other's digital signatures is a daunting task. Moreover, S-BGP does little to help detect or diagnose faulty routing information emanating (accidentally or maliciously) from a router; it only ensures reliable identification of the information's origin (for after-the-fact, out-of-band blame assignment). [0003]
  • Another proposed approach is to maintain a centralized registry of “plausibility” information about routing advertisements, so that blatantly invalid advertisements can be discounted when received. This approach can prevent the most egregious routing problems that arise from router misconfigurations, but it is still vulnerable to a wide range of both inadvertent and malicious false advertisements for routes that a particular router may be “entitled” to advertise, but cannot in fact serve. [0004]
  • SUMMARY
  • In accordance with the foregoing, a method and system for detecting a communication problem in a computer network is provided. According to the invention, a computer in the network runs a verification procedure in which it sends data packets to another computer in the network. Some or all of the data packets contain, either individually or collectively, a secret piece of information, such as a secret code. The computer then makes a determination regarding the network links between it and the other computer. If, for example, the other computer is able to respond by providing the secret piece of information back, then the computer sending the data packets concludes that the devices along the network links en route to the other computer are properly forwarding data packets. [0005]
  • Additional aspects of the invention will be made apparent from the following detailed description of illustrative embodiments that proceeds with reference to the accompanying figures.[0006]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • While the appended claims set forth the features of the present invention with particularity, the invention may be best understood from the following detailed description taken in conjunction with the accompanying drawings of which: [0007]
  • FIG. 1 illustrates an example of a computer network in which the invention may be practiced; [0008]
  • FIG. 2 illustrates an example of a computer on which at least some parts of the invention may be implemented; [0009]
  • FIG. 3 illustrates a network on which a verification procedure may be performed according to an embodiment of the invention. [0010]
  • FIG. 4 illustrates a procedure that is followed when a router conducts an investigation in accordance with an embodiment of the invention; and [0011]
  • FIG. 5 illustrates an example of a network on which a router may conduct an investigation in accordance with an embodiment of the invention.[0012]
  • DETAILED DESCRIPTION
  • The invention is generally directed to a method and system for detecting a communication problem on a computer network. The invention can be used in a variety of contexts. For example, the invention can be used to detect faulty or malicious routing in a network. According to various embodiments of the invention, a computer tests network links by transmitting data packets to a receiving computer over the network links. The data packets, either individually or collectively, contain a piece of information that is secret, both in terms of its existence and in terms of its content. The secret piece of information may take a variety of forms. For example, the secret piece of information may be the number of data packets that contain a secret code Or, the secret piece of information may be a large number that can only be derived if the receiving computer knows a certain algorithm and is able to receive at least a certain percentage of the data packets. The computer sending the data packets then makes a determination regarding the network links based on the response that the receiving computer sends back. If, for example, the receiving computer is able to reconstruct the secret piece of information and transmit it back, the computer concludes that the devices en route to the receiving computer are properly forwarding data packets. [0013]
  • Prior to proceeding with a description of the various embodiments of the invention, a description of the computer and networking environment in which the various embodiments of the invention may be practiced will now be provided. Although it is not required, the present invention may be implemented by programs that are executed by a computer. Generally, programs include routines, objects, components, data structures and the like that perform particular tasks or implement particular abstract data types. The term “program” as used herein may connote a single program module or multiple program modules acting in concert. The term “computer” as used herein includes any device that electronically executes one or more programs, such as personal computers (PCs), hand-held devices, multiprocessor systems, microprocessor-based programmable consumer electronics, network PCs, minicomputers, mainframe computers, consumer appliances having a microprocessor or microcontroller, routers, gateways, hubs and the like. The invention may also be employed in distributed computing environments, where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, programs may be located in both local and remote memory storage devices. [0014]
  • An example of a networked environment in which the invention may be used will now be described with reference to FIG. 1. The example network includes [0015] several computers 10 communicating with one another over a network 11, represented by a cloud. Network 11 may include many well-known components, such as routers, gateways, hubs, etc. and allows the computers 10 to communicate via wired and/or wireless media. When interacting with one another of the network 11, one or more of the computers may act as clients, servers or peers with respect to other computers. Accordingly, the various embodiments of the invention may be practiced on clients, servers, peers or combinations thereof, even though specific examples contained herein don't refer to all of these types of computers.
  • Referring to FIG. 2, an example of a basic configuration for a computer on which all or parts of the invention described herein may be implemented is shown. In its most basic configuration, the [0016] computer 10 typically includes at least one processing unit 14 and memory 16. The processing unit 14 executes instructions to carry out tasks in accordance with various embodiments of the invention. In carrying out such tasks, the processing unit 14 may transmit electronic signals to other parts of the computer 10 and to devices outside of the computer 10 to cause some result. Depending on the exact configuration and type of the computer 10, the memory 16 may be volatile (such as RAM), non-volatile (such as ROM or flash memory) or some combination of the two. This most basic configuration is illustrated in FIG. 2 by dashed line 18. Additionally, the computer may also have additional features/functionality. For example, computer 10 may also include additional storage (removable and/or non-removable) including, but not limited to, magnetic or optical disks or tape. Computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information, including computer-executable instructions, data structures, program modules, or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory, CD-ROM, digital versatile disk (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to stored the desired information and which can be accessed by the computer 10. Any such computer storage media may be part of computer 10.
  • [0017] Computer 10 may also contain communications connections that allow the device to communicate with other devices. A communication connection is an example of a communication medium. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. The term “computer-readable medium” as used herein includes both computer storage media and communication media.
  • [0018] Computer 10 may also have input devices such as a keyboard, mouse, pen, voice input device, touch input device, etc. Output devices such as a display 20, speakers, a printer, etc. may also be included. All these devices are well known in the art and need not be discussed at length here.
  • Turning to the invention, reference is made to FIG. 3, in which a computer network is shown. The computer network includes a [0019] first computer 30, a second computer 32, a third computer 34, and a fourth computer 36. The computer network also includes a destination host 38, which is, itself, a computer. The first computer 30 communicates with the second computer 32 via a network link 40. The second computer 32 communicates with the third computer 34 via a network link 42. The third computer 34 communicates with the fourth computer 36 via a network link 44. Finally, the fourth computer 36 communicates with the destination host 38 via a network link 46.
  • Each of the network links [0020] 40-46 of FIG. 3 may include a variety of types of communication media. Also, each of the computers of FIG. 3 is considered to be a part of each link to which it is adjacent. For example, the first computer 30 and the second computer 32 are each considered to be end nodes on the link 40 between them. Similarly, the second computer 32 and the third computer 34 are each considered to be end nodes on the link 42 between them. Furthermore, the third computer 34 and the fourth computer 36 are each considered to be end nodes on the link 44 between them. Finally, the fourth computer 36 and the destination host 38 are each considered to be end nodes on the link 46 between them. Each of the network links 40-46 may also include other, intermediate computers that are not illustrated in FIG. 3.
  • According to an embodiment of the invention, the [0021] first computer 30 verifies whether each of the network links 40-46 between itself and the destination host 38 are functioning by performing a verification procedure. This verification procedure will now be described. First, the first computer 30 establishes a secure communication session with the second computer 32. The first computer 30 then indicates to the second computer 32 as to what information the second computer 32 needs to give to the first computer 30 in order to convince the first computer 30 that the second computer 32 is properly receiving data packets from the first computer 30. In various embodiments of the invention, the information that the first computer 30 requires from the second computer 32 is secret. That is, the information cannot easily be discovered or computed by a third party. The first computer 30 then sends a stream of data packets to the second computer 32. The second computer 32 analyzes information contained in the stream of packets and, based on the analysis, attempts to construct a correct response to the stream of packets. The second computer 32 then transmits what it believes to be the correct response back to the first computer 30. If the response is correct, the first computer 30 deems the link 40 between the first computer 30 and the second computer 32 not to have any problems. In addition to the response, the second computer 32 informs the first computer 30 regarding the identity of the next computer on the way to the host, which, in this case, is the third computer 34. The first computer 30 repeats this procedure with each subsequent computer in FIG. 3, until it has executed the procedure with the third computer 34, the fourth computer 36 and the destination 38, or until it encounters a problem. If the first computer 30 encounters a problem with one of the other computers, it deems the link between that computer and the computer immediately preceding it to have a problem. For example, if the first computer 30 does not receive a correct response to a stream of data packets from the third computer 34, the first computer will designate the link 42 between the second and third computers to be a problem. Similarly, if the first computer 30 does not receive a correct response to a stream of data packets from the destination 38, the first computer will designate the link 42 between the destination 38 and the fourth computer 36 to be a problem.
  • Referring again to FIG. 3, and to the previous description, the stream of data packets sent by the [0022] first computer 30 does not have to originate from the first computer 30 itself, but may include packets that the first computer 30 received from another source, which are simply being forwarded by the first computer 30. In an embodiment of the invention, the first computer 30 receives many data packets that are a part of the normal network data traffic, and identifies a subset of the packets based on some special property that the subset of has—either a collective property, or a property that each individual data packet of the subset ha—and forwards all of the data packets, including the subset, to the other computers of the network. Each of the other computers is then expected to be able to reconstruct the secret piece of information based on the special property of the subset of data packets.
  • There are many possible variations in the verification procedure described above. For example, instead of starting with the [0023] second computer 32, the first computer 30 could start at the destination host 38 and work its way back.
  • There are also a variety of ways in which the [0024] first computer 30 can determine whether it receives a correct response from one of the other computers 30 through 38, depending on how the invention is implemented. Some example implementations will now be given, and, for the sake of clarity, will be described in the context of the first computer 30 executing the verification procedure with the third computer 34. It will be assumed that the first computer 30 has already determined that the link 40 between the first computer 30 and the second computer 32 is not experiencing problems.
  • In one implementation, the first computer establishes a secure communication session with the [0025] third computer 34 and, during the secure communication session, gives the second computer a secret code that the second computer 32 needs to look for in future packets as well as an algorithm that the third computer needs in order to perform an analysis of the data packets having the secret code. The code might be as simple as a bit pattern, or as complex as Rn (mod P), where Rn is one of a list of n randomly generated numbers that the first computer 30 gives to the third computer 34 and P is some prime number that the first computer 30 also gives to the third computer 34. The first computer 30 then ends the secure communication session with the third computer 34. Subsequently, the first computer 30 transmits a stream of data packets to the third computer 34, a random number of which contain the code. The first computer may, but need not, create the packets having the secret code. In one embodiment, the first computer identifies data packets that it received in the normal data traffic and that happen to have the secret code, performs an analysis on those data packets using the algorithm, saves the result of the algorithm as a predetermined “correct” answer, and forwards the identified data packets along with all of the other data packets to the third computer 34 via the second computer 32. Upon receiving the data packets, the third computer 34 uses the algorithm it received from the first computer 30 to perform some sort of analysis, such as a probabilistic, statistical or cryptographic analysis, on those data packets having the secret code. For example, the algorithm may require the third computer 34 to compute a cryptographic checksum on a concatenation of all of the packets having the secret code. An example of an algorithm that may be used for this purpose is the secure hash algorithm SHA-1. The third computer 34 returns the result of its analysis to the first computer 30. The first computer 30 compares the result returned by the third computer 34 with the predetermined “correct” result. If the two values match, or are within an acceptable margin of error of one another, then the first computer deems the link 42 between the second computer 32 and the third computer 34 not to have problems. If the two values do not match or are outside an acceptable margin of error with respect to one another, then the first computer 30 designates the link 42 to have a problem. If the first computer 30 has to repeat this procedure with one of the other computers as when, for example, it does not find a problem with the link 42 between the second computer 32 and the third computer 34, the first computer 30 chooses a different code. For example, if the first computer 30 used the bit pattern 0011 as the code when carrying out the procedure with the third computer 34, it might use the bit pattern 1101 when carrying out the procedure with the fourth computer 36, and the bit pattern 1111 when carrying out the procedure with the destination host 38. The code could be in a particular field as specified by a security procedure known to both the first and second computers. For example, the first computer 30 might instruct the second computer 32 to look for the code in an unused portion of the IP header. In another example, it could be understood beforehand by both the first computer 30 and the second computer 32 that the code that the first computer 30 provides to the second computer 32 during the secure communication session is to be looked for in first byte of the payload portion of the data packet.
  • In another implementation, the [0026] first computer 30 instructs the third computer 34, during the secure communication session, how to reconstruct a secret piece of information, such as a 128-bit number, that is distributed among the data packets of the stream. For example, the first computer 30 might give the third computer 34 an algorithm for doing so. The first computer 30 then breaks the piece of information down into parts, distributes those parts among multiple data packets, and sends the data packets to the third computer 34. The first computer then awaits a response from the third computer 34. The third computer 34, if it receives the data packets, extracts the constituent parts of the secret piece of information, reconstructs the secret piece of information, and transmits a response containing the secret piece of information to the first computer 30. If the response is correct, i.e. contains a correct value for the secret piece of information, the first computer 30 determines that the link 42 between the second computer 32 and the third computer 34 is not experiencing problems. The nature of the secret piece of information may be such that it can be reconstructed with a certain percentage of the data packets. For example, the secret piece of information may be of a type that the third computer 34 can reconstruct if it receives 85% of the data packets. In some embodiments, the percentage of data packets needed to reconstruct the secret piece of information is between and inclusive of about 80% and about 90%.
  • The verification procedure described in conjunction with FIG. 3 can be used in a variety of contexts. According to an embodiment of the invention, the verification procedure is used by a router as part of an investigation to determine whether or not there are any problems in various links of a network. An example of the overall steps that a router takes during the course of such an investigation will now be described with reference to the flowchart of FIG. 4. At [0027] step 50, the router receives complaints from other computers on the network regarding a particular destination computer on the network. These complaints may take a variety of forms. For example, in standard TCP/IP communication, if an end host detects an end-to-end performance problem when sending data packets to a particular destination, it sets a “complaint bit” in subsequent data packets sent to that destination. Thus, one way in which the router recognizes complaints at step 50 is by observing data packets that pass through it, that are bound for a particular destination and that also have the complaint bit set.
  • At [0028] step 52, the router conducts an initial evaluation of the complaints. As part of this initial evaluation, the router uses some sort of mechanism to determine whether or not some or all of the complaints are real or are being faked. If the router determines that a sender of a complaint is, for example, setting a complaint bit in order to mislead, then the router takes no action regarding that sender's complaint and ignores future complaints from that sender. The router also evaluates the total volume of complaints from all sources. For example, if a router receives complaints from only a small fraction of end users attempting to reach a particular destination address, the router may choose to ignore those complaints as anomalous. If, at step 54, the router determines that the complaints are not worth investigating, then the overall investigation ends. Otherwise, if most or all traffic sent to a particular destination suggests that there is a routing problem, the router will continue with the investigation at step 56.
  • At [0029] step 56, the router executes a traceroute procedure, sending traceroute packets to the destination that is the subject of the complaints. Traceroute is a well-known procedure and, while there are several variations, it basically involves sending a traceroute packet to the first host that is upstream of the sender (the router is the sender, in this example). The traceroute packet may be implemented as a normal UDP or ICMP packet with a limited time-to-live (TTL). The first upstream host responds to the sender by confirming that it has received the traceroute packet. The first upstream host also decrements the TTL and forwards the traceroute packet to the next upstream host. The next upstream host performs the same steps as the first upstream host. This process is repeated until the traceroute packet reaches the destination, or until its TTL reaches zero. When the TTL reaches zero, the next host receiving the traceroute packet generates an ICMP response that enables the router to discover the presents of that host. If, at step 58, the router determines that the traceroute procedure is successful, then the investigation proceeds to step 60. At step 60, the router executes a verification procedure with each of the upstream routers on each of the hops that it knows about between itself and the destination. This verification procedure is executed in accordance with the invention, examples of which were described in conjunction with FIG. 3. If, at step 62, the router determines that the verification procedure is successful with respect to each of the upstream routers on which the verification procedure is performed, then the investigation is complete, and the router concludes that it cannot accurately identify the link in the network that is having the problem.
  • Referring back to step [0030] 58, the router determines that the traceroute procedure has failed, the investigation proceeds to step 64. At step 64, the router executes a verification procedure on the first upstream router that failed to respond properly to the traceroute packet. Again, this verification procedure is executed in accordance with the invention, examples of which were described in conjunction with FIG. 3. The verification procedure is used to confirm the results of the traceroute procedure. The investigation then proceeds to step 66. At step 66, the router deems the link between the last router that responded properly to the verification procedure and the first router that failed to respond properly to be the problem link. The investigation then ends, and the router is free to take corrective action, such as by routing around the link that is determined to be a problem.
  • An example of a scenario in which an embodiment of the invention is used will now be described with reference to FIG. 5 and with parenthetical reference to the corresponding steps of the flowchart of FIG. 4. In this example, a [0031] computer network 92 includes a first router 70, a second router 72, a third router 74, and a fourth router 76 are shown. The network 92 also includes a destination host 78, which is, itself, a computer, and a public key registry 90, which contains the public key of each router in the network 92. Each of the routers represents a routing hop to the destination host 78. Thus, there are four routing hops shown from the first router 70 to the destination host 78. The first router 70 communicates with the second router 72 via a network link 80. The second router 72 communicates with the third router 74 via a network link 82. The third router 74 communicates with the fourth router 76 via a network link 84. Finally, the fourth router 76 communicates with the destination host 78 via a network link 86. As in the network of FIG. 3, each network link shown in FIG. 5 includes the two nodes on either side of it and may include other computers that are not shown. It is assumed in this example that the second router 72 has been taken over by a malicious entity, labeled 88, which does not forward data packets to other nodes on the network 92, but which permits the second router 72 to respond correctly to traceroute packets sent to it, and even to mimic appropriate responses to traceroute packets sent to other entities. It is also assumed in this example that the first router 70 has received complaints from other routers in the network 92 regarding the destination host 78 (step 50). The first router 70 conducts an initial evaluation of the complaint (step 52). Based on the initial evaluation, the first router 70 determines whether or not to conduct a further investigation (step 54). If the first router 70 determines that further investigation is not warranted, the procedure ends. Otherwise, the first router 70 executes a traceroute procedure for the destination host 78. As part of the traceroute procedure, the first router 70 sends traceroute packets to the second router 72. The second router 72 responds appropriately to the traceroute packets, and generates a set of bogus traceroute responses that mimics the responses that would be expected from the third router 74, the fourth router 76 if the links 82, 84 and 86 between the second and third routers, the third and fourth routers, and between the fourth router and the destination host were functioning correctly. The first router 70 therefore determines that the traceroute procedure has succeeded (step 58). The first router 70 then initiates a verification procedure in accordance with an embodiment of the invention (step 60). The first router 70 looks up the public key of the second router 72 in the public key registry 90. Using the second router's public key, the first router 70 establishes a secure communication session with the second router 72. The first router 70 then gives an algorithm to the second router 72 and indicates to the second router 72 that the second router 72 needs to perform the algorithm using all data packets that it receives from the first router 70 that have the code 1101 in the most significant half of the first byte of payload. The first router 70 then terminates the secure session with the second router 72, and sends the second router 72 a stream of 300 data packets, 100 of which have the code. The second router 72 correctly performs the algorithm on the 100 coded data packets, and replies to the first router 70 with the correct response. The first router 70 determines, based on the response, that the link 80 between the first router 70 and the second router 72 is not experiencing any problems.
  • Continuing the verification procedure, the [0032] first router 70 looks up the public key of the third router 74 in the public key registry 90. Using the third router's public key, the first router 70 attempts to establish a secure communication session with the third router 74. The second router 72, still under the control of the malicious entity 88, and recognizing that first router 70 is attempting to establish a secure communication session with the third router 74, permits the data packets that are involved in the secure communication session to reach the third router 74. The second router 72 also permits the third router 74 to respond to the first router 70 during the secure communication session, so as not to arouse suspicion. The first router 70 then gives an algorithm to the third router 78 and indicates to the third router 74 that the third router 74 needs to perform the algorithm using all data packets that it receives from the first router 70 that have the code 1111 in the most significant half of the first byte of payload. The first router 70 then terminates the secure session with the third router 74. The second router 72, under the control of the malicious entity 88, ceases forwarding data packets. The first router 70 sends the third router 74 a stream of 300 data packets, 50 of which have the code 1111. These data packets never reach the third router 74. Furthermore, the second router 72, not having been privy to the content of the secure communication session between the first router 70 and the third router 74, does not know which data packets of the 300 are significant to the third router 74, or what to do with the packets, and is not able to mimic an appropriate response. The first router 70 determines, based on the lack of response from the third router 74 (or an incorrect bogus response from the second router 72), that the verification procedure has failed (step 62). Based on the point of failure, the first router 70 determines that the link 82 between the second router 72 and the third router 74 is experiencing problems (step 66). The first router 70 then takes corrective action, such sending future data packets to the third router 74 via a new route that excludes the link 82 between the second router 72 and the third router 74.
  • Although several examples of how the invention may be implemented have been described, there are many other variations possible. The variation employed may depend on a variety of factors, such as the type of malicious attack expected. For example, a malicious router may adjust its disruptive behavior so as to avoid detection. It may, for example, confine its attacks to periods of time where it does not detect any attempts to initiate the verification procedure described above (i.e., does not detect key exchange packets from upstream routers). According to an embodiment of the invention, routers wishing to thwart this attack can give occasional indications that they are initiating the verification procedure (such as by sending key exchange packets—whether real or bogus) whenever there is any hint of a problem. Since the malicious router cannot distinguish real verification attempts from fictitious ones (beyond detecting the presence or absence of key exchanges), the presence of such simulations should ensure that misbehavior occurs either at such times when it can be detected by the verification procedure, or else not at all. Alternatively, the malicious router may attempt to interfere with the verification procedure by selectively blackholing (dropping) the packets used in the key exchange phase, so as to give the impression that a router further downstream is not accepting key exchanges (and hence is either malfunctioning or malicious). This attack cannot be used by a single misbehaving router to frame a router further downstream. The reason for this is the following: if the misbehavior affects normal traffic, then the verification procedure will correctly detect a misbehaving link when the (honest) router immediately downstream of the adversary on the path reports the anomalous traffic pattern. However, two misbehaving routers could collude to frame a router between them on a path as follows: the downstream confederate disrupts traffic, while the upstream one disrupts key exchanges to the victim router so as to implicate it. A countermeasure to this attack that may be used in an embodiment of the invention (if multiple colluding routers are deemed a threat, and if redundant routes are not being used to effect the key exchange) is to use so-called “onion routing” style encryption of key exchange messages. In onion routing, each router that receives a message is able to decrypt just enough information to determine the next router to which the message is to be forwarded, but is not able to determine the destination of any further hops. Since the verification procedure described above involves a key exchange with each router along the path to the destination, the key exchange traffic can be encrypted hop by hop, so that each router along the route does not know the final destination of the message (and therefore cannot consistently frame a single router). [0033]
  • It can thus be seen that a new and useful method and system for detecting a communication problem in a computer network has been provided. In view of the many possible embodiments to which the principles of this invention may be applied, it should be recognized that the embodiments described herein with respect to the drawing figure is meant to be illustrative only and should not be taken as limiting the scope of invention. For example, those of skill in the art will recognize that the elements of the illustrated embodiments shown in software may be implemented in hardware and vice versa or that the illustrated embodiments can be modified in arrangement and detail without departing from the spirit of the invention. Therefore, the invention as described herein contemplates all such embodiments as may come within the scope of the following claims and equivalents thereof. [0034]

Claims (43)

I claim:
1. A method for detecting a communication problem in a computer network, the method comprising:
transmitting a plurality of data packets to a computer over the network link;
indicating to the computer, in a secure communication session, how to identify a subset of the data packets;
receiving, from the computer, information that is based on an analysis of the subset of data packets performed by the computer; and
based on the information, determining whether or not there is a problem with the network link.
2. A computer-readable medium having stored thereon computer-executable instructions for performing the method of claim 1.
3. The method of claim 1, wherein the indicating step comprises:
establishing the secure communication session with the computer; and
transmitting, during the secure communication session, a message that indicates to the computer which data packets of the plurality are to be the subject of the analysis.
4. The method of claim 1, wherein the determining step comprises:
comparing the information with a value, the value representing the correct result that is to be obtained based on the analysis; and
if the information is within an acceptable margin of error of the value, deeming the network link to not have a problem.
5. The method of claim 1, wherein the determining step comprises:
comparing the information with a plurality of acceptable results; and
if the information matches an acceptable result of the plurality, deeming the network link to not have a problem.
6. The method of claim 1, wherein the analysis is a probabilistic analysis.
7. The method of claim 1, wherein the analysis is a statistical analysis.
8. The method of claim 1, wherein the analysis is a cryptographic analysis.
9. The method of claim 1, further comprising:
the computer performing the analysis on the subset of the data packets; and
the computer transmitting the results of the analysis.
10. A method for detecting a communication problem in a computer network, the method comprising:
a first computer transmitting a plurality of data packets to a second computer over the network link, wherein at least a subset of the data packets have a special property that distinguishes them from the rest of the data packets;
the first computer indicating, to the second computer, what the special property is;
the first computer receiving, from the second computer, information that is based on an analysis of those data packets of the subset that are received by the second computer; and
the first computer determining, based on the received information, whether or not there is a problem with the network link.
11. A computer-readable medium having stored thereon computer-executable instructions for performing the method of claim 10.
12. The method of claim 10, wherein the indicating step comprises:
the first computer establishing a secure communication session with the second computer; and
the first computer transmitting, during the secure communication session, a message that indicates to the second computer what the special property is.
13. The method of claim 10, wherein the indicating step comprises:
the first computer establishing a secure communication session with the second computer;
the first computer transmitting, during the secure communication session, a message that indicates to the second computer the location of the next hop for data packets, wherein the message contains an encrypted portion that is formatted to prevent decryption by the second computer, the encrypted portion indicating the location of one or more further hops beyond the next hop; and
the second computer transmitting the encrypted portion to a computer located on the next hop.
14. The method of claim 10, wherein the indicating step comprises:
the first computer establishing a secure communication session with the second computer; and
the first computer transmitting, during the secure communication session, a message that indicates to the second computer an algorithm that the second computer needs to perform using the data packets having the special property.
15. The method of claim 10, wherein the determining step comprises:
receiving from the second computer information that is based on a probabilistic analysis of the subset of data packets;
comparing the information with a predetermined answer; and
if the information is within an acceptable margin of error of the predetermined answer, deeming the network link to not have a problem.
16. The method of claim 10, wherein the determining step comprises:
receiving from the second computer information that is based on a statistical analysis of the subset of data packets;
comparing the information with a predetermined answer; and
if the information is within an acceptable margin of error of the predetermined answer, deeming the network link to not have a problem.
17. The method of claim 10, wherein the determining step comprises:
receiving from the second computer information that is based on a cryptographic analysis of the subset of data packets;
comparing the information with a predetermined answer; and
if the information is within an acceptable margin of error of the predetermined answer, deeming the network link to not have a problem.
18. The method of claim 10, wherein the determining step comprises:
comparing the number of packets of the subset with the number of packets of the subset that the second computer indicates has been received; and
if the number of packets of the subset is within an acceptable margin of error of the number of packets of the subset the second computer indicates has been received, deeming the network link to not have a problem.
19. The method of claim 10, wherein the special property is one or more secret codes contained in each of the subset of packets, and the determining step comprises:
comparing the number of data packets sent with the secret codes to the second computer with the number of data packets having the secret codes that the second computer indicates it has received; and
if the number of data packets sent is with the secret codes is within an acceptable margin of error of the number of data packets having the secret codes the second computer indicates has been received, deeming the network link to not have a problem.
20. The method of claim 10, wherein indicating step comprises:
sending, to the second computer, a list of numbers and a prime number; and
the second computer understanding that it needs to perform an analysis using data packets that include, in a particular field, an equivalent value of one of the numbers on the list modulo the prime number.
21. The method of claim 10, wherein the determining step comprises:
receiving from the second computer information that is based on a cryptographic checksum computed on the concatenation of all of the data packets of the subset;
comparing the information with a predetermined answer; and
if the information is within an acceptable margin of error of the predetermined answer, deeming the network link to not have a problem.
22. A method for detecting a communication problem in a computer network, the method comprising:
receiving, from a computer, information regarding how to identify a secret code;
receiving, from the computer, a plurality of data packets over the network link;
performing an analysis of the data packets of the plurality that have the secret code to obtain a result; and
transmitting, to the computer, the result, thereby verifying that the network link is good.
23. A computer-readable medium having stored thereon computer-executable instructions for performing the method of claim 22.
24. The method of claim 22,
wherein the receiving step comprises:
establishing a secure communication session with the computer; and
receiving, during the communication session, an algorithm;
and wherein the performing step comprises executing the algorithm on the data packets having the secret code.
25. The method of claim 22, wherein the receiving step comprises receiving a shared key from the computer;
using the shared key to establish a secure communication session with the computer; and
receiving, during the communication session, an indication of how to determine which of the plurality of packets contain the secret code.
26. The method of claim 22, wherein the receiving step comprises:
receiving a plurality of numbers from the computer, wherein at least one of the plurality of numbers is prime; and
performing a modulus operation on at least one of the plurality of numbers using the prime number,
wherein the performing step comprises performing an analysis on those data packets that are received from the computer and that contain the result of the modulus operation.
27. A method for verifying one or more network links, wherein one of the network links is bounded by a first computer and a second computer, the network link serving as one of a plurality of hops for network data traffic, the method comprising:
establishing a secret piece of information;
breaking the secret piece of information into parts;
distributing the parts of the secret piece of information among a plurality of data packets;
transmitting the plurality of data packets to the first computer over one or more of the plurality of the routing hops, including the routing hop being served by the network link;
transmitting the plurality of data packets to the second computer over one or more of the plurality of hops, excluding the routing hop being served by the network link; and
determining whether or not the network link has problems based on whether or not the secret piece of information is received from the first computer and whether or not the secret piece of information is received from the second computer.
28. A computer-readable medium having stored thereon computer-executable instructions for performing the method of claim 27.
29. The method of claim 27, wherein the first computer or the second computer can only reconstruct the secret piece of information if it receives a certain percentage of the plurality of data packets.
30. The method of claim 29, wherein the certain percentage is between and inclusive of about 80 and about 90 percent.
31. The method of claim 27, wherein a second of the network links is bounded by the second computer and a third computer, the method further comprising:
transmitting the plurality of data packets to the second computer over one or more of the plurality of the routing hops, including the routing hop being served by the second network link;
transmitting the plurality of data packets to the third computer over one or more of the plurality of hops, excluding the routing hop being served by the second network link; and
determining whether or not the second network link has problems based on whether or not the secret piece of information is received from the second computer and whether or not the secret piece of information is received from the third computer.
32. A method for verifying a network link, the method comprising:
receiving, at a receiving computer, a plurality of data packets from a sending computer over the network link, the network link including at least one other computer, at least some of the plurality of data packets being forwarded by the other computer to the receiving computer;
reconstructing, a secret piece of information using the plurality of received data packets, the secret piece of information being distributed among the plurality of data packets; and
transmitting the secret piece of information back to the sending computer, thereby verifying to the sending computer that the other computer is properly forwarding data packets to the receiving computer.
33. A computer-readable medium having stored thereon computer-executable instructions for performing the method of claim 32.
34. The method of claim 32,
wherein the reconstructing step comprises extracting a parts of secret number from at least some of the plurality of data packets and reconstructing the secret number; and
wherein the transmitting step comprises transmitting the secret number.
35. The method of claim 34, further comprising receiving an indication from the sending computer regarding how to reconstruct the secret number.
36. The method of claim 35, further comprising establishing a secure communication session with the sending computer, wherein the step of receiving an indication from the sending computer is performed during the secure communication session.
37. A method for verifying a network link, the network link comprising a first, second and third router, the method comprising:
the first router inserting a secret piece of information into one or more data packets;
the first router informing the third router regarding the identity of the secret piece of information;
the first router transmitting the one or more data packets containing the secret piece of information to the third router over the network link via the second router;
the first router receiving, from the third router, an indication regarding whether the third router can identify the secret piece of information based on the data packets; and
the first router determining whether there are problems with the network link between the second router and the third router based on the receiving step.
38. A computer-readable medium having stored thereon computer-executable instructions for performing the method of claim 37.
39. The method of claim 37, wherein the inserting step comprises the first router inserted into a certain number of the packets a secret code.
40. The method of claim 37, wherein the inserting step comprises the first router inserted into a certain number of the packets a secret code, the method further comprising the first router transmitting the secret code to the third router prior to the inserting step.
41. The method of claim 37, wherein the inserting step comprises the first router inserted into a certain number of the packets a secret code, the method further comprising:
the first router establishing a secure communication session with the third router; and
the first router transmitting the secret code to the third router during the secure communication session.
42. A system for verifying a network link between a first router and a second router, the system comprising:
a means for inserting a secret piece of information into one or more data packets;
a means for transmitting the one or more data packets over the network link to the second router via the first router;
a means for analyzing the data packets to identify the secret piece of information; and
a means for responding to the transmitted packets by sending the secret piece of information back over the network link via the first router.
43. The method of claim 42, wherein the means for analyzing is a processing unit on a computer.
US10/246,156 2002-09-18 2002-09-18 Method and system for detecting a communication problem in a computer network Abandoned US20040064725A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/246,156 US20040064725A1 (en) 2002-09-18 2002-09-18 Method and system for detecting a communication problem in a computer network
US12/193,277 US8001605B2 (en) 2002-09-18 2008-08-18 Method and system for detecting a communication problem in a computer network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/246,156 US20040064725A1 (en) 2002-09-18 2002-09-18 Method and system for detecting a communication problem in a computer network

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/193,277 Division US8001605B2 (en) 2002-09-18 2008-08-18 Method and system for detecting a communication problem in a computer network

Publications (1)

Publication Number Publication Date
US20040064725A1 true US20040064725A1 (en) 2004-04-01

Family

ID=32028947

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/246,156 Abandoned US20040064725A1 (en) 2002-09-18 2002-09-18 Method and system for detecting a communication problem in a computer network
US12/193,277 Expired - Fee Related US8001605B2 (en) 2002-09-18 2008-08-18 Method and system for detecting a communication problem in a computer network

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/193,277 Expired - Fee Related US8001605B2 (en) 2002-09-18 2008-08-18 Method and system for detecting a communication problem in a computer network

Country Status (1)

Country Link
US (2) US20040064725A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040091117A1 (en) * 2002-11-13 2004-05-13 Nokia Corporation Key distribution across networks
US20050232239A1 (en) * 2004-04-19 2005-10-20 Ilnicki Slawomir K Packet tracing using dynamic packet filters
US20060268725A1 (en) * 2005-05-25 2006-11-30 International Business Machines Corporation Operating network managers in verification mode to facilitate error handling of communications networks
US7457866B1 (en) * 2003-03-24 2008-11-25 Netapp, Inc. Method and apparatus for diagnosing connectivity problems from a network management station
US20080320152A1 (en) * 2002-09-18 2008-12-25 Microsoft Corporation Method and system for detecting a communication problem in a computer network
US20090097651A1 (en) * 2007-10-15 2009-04-16 Adobe Systems Incorporated Imparting cryptographic information in network communications
US20090147689A1 (en) * 2007-12-11 2009-06-11 Institute For Information Industry Method, network apparatus and computer readable medium thereof for detecting the defect of the network
US20100095121A1 (en) * 2008-10-15 2010-04-15 Adobe Systems Incorporated Imparting real-time priority-based network communications in an encrypted communication session
US7930424B1 (en) * 2007-05-09 2011-04-19 Narus, Inc. System and method for detecting bogus BGP route information
US20110283367A1 (en) * 2010-05-13 2011-11-17 International Business Machines Corporation Securing a communication protocol against attacks
US20120017120A1 (en) * 2010-07-19 2012-01-19 Microsoft Corporation Monitoring activity with respect to a distributed application
US10887251B2 (en) * 2018-09-13 2021-01-05 International Business Machines Corporation Fault-tolerant architecture for packet capture
CN116319119A (en) * 2023-05-26 2023-06-23 广东广宇科技发展有限公司 Accompanying type iterative communication verification method

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070055740A1 (en) * 2005-08-23 2007-03-08 Luciani Luis E System and method for interacting with a remote computer
US8341739B2 (en) * 2007-05-24 2012-12-25 Foundry Networks, Llc Managing network security
US8887284B2 (en) * 2011-02-10 2014-11-11 Circumventive, LLC Exfiltration testing and extrusion assessment
US8935750B2 (en) * 2011-10-03 2015-01-13 Kaspersky Lab Zao System and method for restricting pathways to harmful hosts in computer networks
US9473346B2 (en) 2011-12-23 2016-10-18 Firebind, Inc. System and method for network path validation
US9853995B2 (en) 2012-11-08 2017-12-26 AO Kaspersky Lab System and method for restricting pathways to harmful hosts in computer networks
US10320954B2 (en) 2017-02-03 2019-06-11 Microsoft Technology Licensing, Llc Diffusing packets to identify faulty network apparatuses in multipath inter-data center networks
US10367811B2 (en) 2017-10-06 2019-07-30 Stealthpath, Inc. Methods for internet communication security
US10630642B2 (en) 2017-10-06 2020-04-21 Stealthpath, Inc. Methods for internet communication security
US10397186B2 (en) 2017-10-06 2019-08-27 Stealthpath, Inc. Methods for internet communication security
US10375019B2 (en) 2017-10-06 2019-08-06 Stealthpath, Inc. Methods for internet communication security
US10374803B2 (en) 2017-10-06 2019-08-06 Stealthpath, Inc. Methods for internet communication security
US10361859B2 (en) 2017-10-06 2019-07-23 Stealthpath, Inc. Methods for internet communication security
US11394718B2 (en) * 2019-06-10 2022-07-19 Microsoft Technology Licensing, Llc Resolving decentralized identifiers using multiple resolvers
US11363032B2 (en) 2019-08-22 2022-06-14 Microsoft Technology Licensing, Llc Resolving decentralized identifiers at customized security levels
US11146552B1 (en) * 2019-08-29 2021-10-12 American Express Travel Related Services Company, Inc. Decentralized application authentication
US11558423B2 (en) 2019-09-27 2023-01-17 Stealthpath, Inc. Methods for zero trust security with high quality of service

Citations (31)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5473691A (en) * 1993-11-05 1995-12-05 Microsoft Corporation System and method for computer data transmission
US5673319A (en) * 1995-02-06 1997-09-30 International Business Machines Corporation Block cipher mode of operation for secure, length-preserving encryption
US5729698A (en) * 1995-05-16 1998-03-17 Master Control Systems, Inc. Fire pump data system for producing submittals
US5778065A (en) * 1993-09-20 1998-07-07 International Business Machines Corporation Method and system for changing an authorization password or key in a distributed communication network
US5850449A (en) * 1995-10-26 1998-12-15 Sun Microsystems, Inc. Secure network protocol system and method
US5892904A (en) * 1996-12-06 1999-04-06 Microsoft Corporation Code certification for network transmission
US6021403A (en) * 1996-07-19 2000-02-01 Microsoft Corporation Intelligent user assistance facility
US6151679A (en) * 1995-09-18 2000-11-21 Fortress Technologies Inc. Of Florida System and method for preventing a first node from being emulated by another node
US6321338B1 (en) * 1998-11-09 2001-11-20 Sri International Network surveillance
US20020035628A1 (en) * 2000-09-07 2002-03-21 Gil Thomer Michael Statistics collection for network traffic
US6363056B1 (en) * 1998-07-15 2002-03-26 International Business Machines Corporation Low overhead continuous monitoring of network performance
US6367012B1 (en) * 1996-12-06 2002-04-02 Microsoft Corporation Embedding certifications in executable files for network transmission
US20020046275A1 (en) * 2000-06-12 2002-04-18 Mark Crosbie System and method for host and network based intrusion detection and response
US20020078381A1 (en) * 2000-04-28 2002-06-20 Internet Security Systems, Inc. Method and System for Managing Computer Security Information
US6453345B2 (en) * 1996-11-06 2002-09-17 Datadirect Networks, Inc. Network security and surveillance system
US6499107B1 (en) * 1998-12-29 2002-12-24 Cisco Technology, Inc. Method and system for adaptive network security using intelligent packet analysis
US20030018908A1 (en) * 2001-07-23 2003-01-23 Mercer Chad W. Method for establishing a security association between two or more computers communicating via an interconnected computer network
US20030028803A1 (en) * 2001-05-18 2003-02-06 Bunker Nelson Waldo Network vulnerability assessment system and method
US20030033403A1 (en) * 2001-07-31 2003-02-13 Rhodes N. Lee Network usage analysis system having dynamic statistical data distribution system and method
US20030051026A1 (en) * 2001-01-19 2003-03-13 Carter Ernst B. Network surveillance and security system
US20030055962A1 (en) * 2001-07-06 2003-03-20 Freund Gregor P. System providing internet access management with router-based policy enforcement
US6539479B1 (en) * 1997-07-15 2003-03-25 The Board Of Trustees Of The Leland Stanford Junior University System and method for securely logging onto a remotely located computer
US20030074357A1 (en) * 2001-10-16 2003-04-17 Microsoft Corporation Scoped referral statements
US20030163569A1 (en) * 2002-02-26 2003-08-28 Citrix Systems, Inc Secure traversal of network components
US20030163729A1 (en) * 2002-02-27 2003-08-28 International Business Machines Corporation Security management in data processing networks
US20030188189A1 (en) * 2002-03-27 2003-10-02 Desai Anish P. Multi-level and multi-platform intrusion detection and response system
US6654882B1 (en) * 2002-05-24 2003-11-25 Rackspace, Ltd Network security system protecting against disclosure of information to unauthorized agents
US20040025044A1 (en) * 2002-07-30 2004-02-05 Day Christopher W. Intrusion detection system
US20040049585A1 (en) * 2000-04-14 2004-03-11 Microsoft Corporation SERVER SIDE CONFIGURATION OF CLIENT IPSec LIFETIME SECURITY PARAMETERS
US20040054807A1 (en) * 2002-09-11 2004-03-18 Microsoft Corporation System and method for creating improved overlay network with an efficient distributed data structure
US6996843B1 (en) * 1999-08-30 2006-02-07 Symantec Corporation System and method for detecting computer intrusions

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE69311581T2 (en) 1993-07-27 1997-12-11 Ibm METHOD AND SYSTEM FOR AUTHENTICATED SECURE KEY DISTRIBUTION IN A COMMUNICATION SYSTEM
US5511122A (en) * 1994-06-03 1996-04-23 The United States Of America As Represented By The Secretary Of The Navy Intermediate network authentication
US6538997B1 (en) * 1998-06-24 2003-03-25 3Com Corporation Layer-2 trace method and node
US6418472B1 (en) * 1999-01-19 2002-07-09 Intel Corporation System and method for using internet based caller ID for controlling access to an object stored in a computer
WO2000049764A1 (en) * 1999-02-18 2000-08-24 Sun Microsystems, Inc. Data authentication system employing encrypted integrity blocks
US6425004B1 (en) * 1999-02-24 2002-07-23 Nortel Networks Limited Detecting and locating a misbehaving device in a network domain
US7246238B2 (en) * 2001-01-25 2007-07-17 Schlumberger Omnes, Inc. System and method for providing integration via a dial-up interface
US7096359B2 (en) * 2001-03-01 2006-08-22 University Of Cincinnati Authentication scheme for ad hoc and sensor wireless networks
US7590855B2 (en) * 2002-04-30 2009-09-15 Tippingpoint Technologies, Inc. Steganographically authenticated packet traffic
US20040064725A1 (en) 2002-09-18 2004-04-01 Microsoft Corporation Method and system for detecting a communication problem in a computer network

Patent Citations (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5778065A (en) * 1993-09-20 1998-07-07 International Business Machines Corporation Method and system for changing an authorization password or key in a distributed communication network
US5473691A (en) * 1993-11-05 1995-12-05 Microsoft Corporation System and method for computer data transmission
US5673319A (en) * 1995-02-06 1997-09-30 International Business Machines Corporation Block cipher mode of operation for secure, length-preserving encryption
US5729698A (en) * 1995-05-16 1998-03-17 Master Control Systems, Inc. Fire pump data system for producing submittals
US6151679A (en) * 1995-09-18 2000-11-21 Fortress Technologies Inc. Of Florida System and method for preventing a first node from being emulated by another node
US5850449A (en) * 1995-10-26 1998-12-15 Sun Microsystems, Inc. Secure network protocol system and method
US6021403A (en) * 1996-07-19 2000-02-01 Microsoft Corporation Intelligent user assistance facility
US6233570B1 (en) * 1996-07-19 2001-05-15 Microsoft Corporation Intelligent user assistance facility for a software program
US6453345B2 (en) * 1996-11-06 2002-09-17 Datadirect Networks, Inc. Network security and surveillance system
US5892904A (en) * 1996-12-06 1999-04-06 Microsoft Corporation Code certification for network transmission
US6367012B1 (en) * 1996-12-06 2002-04-02 Microsoft Corporation Embedding certifications in executable files for network transmission
US6539479B1 (en) * 1997-07-15 2003-03-25 The Board Of Trustees Of The Leland Stanford Junior University System and method for securely logging onto a remotely located computer
US6363056B1 (en) * 1998-07-15 2002-03-26 International Business Machines Corporation Low overhead continuous monitoring of network performance
US6484203B1 (en) * 1998-11-09 2002-11-19 Sri International, Inc. Hierarchical event monitoring and analysis
US6321338B1 (en) * 1998-11-09 2001-11-20 Sri International Network surveillance
US6499107B1 (en) * 1998-12-29 2002-12-24 Cisco Technology, Inc. Method and system for adaptive network security using intelligent packet analysis
US6996843B1 (en) * 1999-08-30 2006-02-07 Symantec Corporation System and method for detecting computer intrusions
US20040049585A1 (en) * 2000-04-14 2004-03-11 Microsoft Corporation SERVER SIDE CONFIGURATION OF CLIENT IPSec LIFETIME SECURITY PARAMETERS
US20020078381A1 (en) * 2000-04-28 2002-06-20 Internet Security Systems, Inc. Method and System for Managing Computer Security Information
US20020046275A1 (en) * 2000-06-12 2002-04-18 Mark Crosbie System and method for host and network based intrusion detection and response
US20020035628A1 (en) * 2000-09-07 2002-03-21 Gil Thomer Michael Statistics collection for network traffic
US20030051026A1 (en) * 2001-01-19 2003-03-13 Carter Ernst B. Network surveillance and security system
US20030028803A1 (en) * 2001-05-18 2003-02-06 Bunker Nelson Waldo Network vulnerability assessment system and method
US20030055962A1 (en) * 2001-07-06 2003-03-20 Freund Gregor P. System providing internet access management with router-based policy enforcement
US20030018908A1 (en) * 2001-07-23 2003-01-23 Mercer Chad W. Method for establishing a security association between two or more computers communicating via an interconnected computer network
US20030033403A1 (en) * 2001-07-31 2003-02-13 Rhodes N. Lee Network usage analysis system having dynamic statistical data distribution system and method
US20030074357A1 (en) * 2001-10-16 2003-04-17 Microsoft Corporation Scoped referral statements
US20030163569A1 (en) * 2002-02-26 2003-08-28 Citrix Systems, Inc Secure traversal of network components
US20030163729A1 (en) * 2002-02-27 2003-08-28 International Business Machines Corporation Security management in data processing networks
US20030188189A1 (en) * 2002-03-27 2003-10-02 Desai Anish P. Multi-level and multi-platform intrusion detection and response system
US6654882B1 (en) * 2002-05-24 2003-11-25 Rackspace, Ltd Network security system protecting against disclosure of information to unauthorized agents
US20040025044A1 (en) * 2002-07-30 2004-02-05 Day Christopher W. Intrusion detection system
US20040054807A1 (en) * 2002-09-11 2004-03-18 Microsoft Corporation System and method for creating improved overlay network with an efficient distributed data structure

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080320152A1 (en) * 2002-09-18 2008-12-25 Microsoft Corporation Method and system for detecting a communication problem in a computer network
US8001605B2 (en) 2002-09-18 2011-08-16 Microsoft Corporation Method and system for detecting a communication problem in a computer network
US7346771B2 (en) * 2002-11-13 2008-03-18 Nokia Corporation Key distribution across networks
US20040091117A1 (en) * 2002-11-13 2004-05-13 Nokia Corporation Key distribution across networks
US7457866B1 (en) * 2003-03-24 2008-11-25 Netapp, Inc. Method and apparatus for diagnosing connectivity problems from a network management station
US7760663B2 (en) * 2004-04-19 2010-07-20 Jds Uniphase Corporation Packet tracing using dynamic packet filters
US20050232239A1 (en) * 2004-04-19 2005-10-20 Ilnicki Slawomir K Packet tracing using dynamic packet filters
US20060268725A1 (en) * 2005-05-25 2006-11-30 International Business Machines Corporation Operating network managers in verification mode to facilitate error handling of communications networks
US7930424B1 (en) * 2007-05-09 2011-04-19 Narus, Inc. System and method for detecting bogus BGP route information
US20090097651A1 (en) * 2007-10-15 2009-04-16 Adobe Systems Incorporated Imparting cryptographic information in network communications
US8284932B2 (en) 2007-10-15 2012-10-09 Adobe Systems Incorporated Imparting cryptographic information in network communications
US7961878B2 (en) * 2007-10-15 2011-06-14 Adobe Systems Incorporated Imparting cryptographic information in network communications
US9055051B2 (en) 2007-10-15 2015-06-09 Adobe Systems Incorporated Imparting cryptographic information in network communications
US8542825B2 (en) 2007-10-15 2013-09-24 Adobe Systems Incorporated Imparting cryptographic information in network communications
US20090147689A1 (en) * 2007-12-11 2009-06-11 Institute For Information Industry Method, network apparatus and computer readable medium thereof for detecting the defect of the network
US8918644B2 (en) 2008-10-15 2014-12-23 Adobe Systems Corporation Imparting real-time priority-based network communications in an encrypted communication session
US8205076B1 (en) 2008-10-15 2012-06-19 Adobe Systems Incorporated Imparting real-time priority-based network communications in an encrypted communication session
US8245033B1 (en) 2008-10-15 2012-08-14 Adobe Systems Incorporated Imparting real-time priority-based network communications in an encrypted communication session
US20100095121A1 (en) * 2008-10-15 2010-04-15 Adobe Systems Incorporated Imparting real-time priority-based network communications in an encrypted communication session
US8051287B2 (en) 2008-10-15 2011-11-01 Adobe Systems Incorporated Imparting real-time priority-based network communications in an encrypted communication session
US8424106B2 (en) * 2010-05-13 2013-04-16 International Business Machines Corporation Securing a communication protocol against attacks
US20110283367A1 (en) * 2010-05-13 2011-11-17 International Business Machines Corporation Securing a communication protocol against attacks
US20120017120A1 (en) * 2010-07-19 2012-01-19 Microsoft Corporation Monitoring activity with respect to a distributed application
US8402311B2 (en) * 2010-07-19 2013-03-19 Microsoft Corporation Monitoring activity with respect to a distributed application
US10887251B2 (en) * 2018-09-13 2021-01-05 International Business Machines Corporation Fault-tolerant architecture for packet capture
CN116319119A (en) * 2023-05-26 2023-06-23 广东广宇科技发展有限公司 Accompanying type iterative communication verification method

Also Published As

Publication number Publication date
US20080320152A1 (en) 2008-12-25
US8001605B2 (en) 2011-08-16

Similar Documents

Publication Publication Date Title
US8001605B2 (en) Method and system for detecting a communication problem in a computer network
US10834066B2 (en) Secure domain name system
Subramanian et al. Listen and whisper: Security mechanisms for BGP
Hu et al. Accurate real-time identification of IP prefix hijacking
Savage et al. Network support for IP traceback
Padmanabhan et al. Secure traceroute to detect faulty or malicious routing
Butler et al. A survey of BGP security issues and solutions
Belenky et al. On deterministic packet marking
US7940761B2 (en) Communication connection method, authentication method, server computer, client computer and program
US10193907B2 (en) Intrusion detection to prevent impersonation attacks in computer networks
Wan et al. S-rip: A secure distance vector routing protocol
CN114389835A (en) IPv6 option explicit source address encryption security verification gateway and verification method
Butler et al. A survey of BGP security
US8364949B1 (en) Authentication for TCP-based routing and management protocols
Strayer et al. Architecture for multi-stage network attack traceback
CN108965309B (en) Data transmission processing method, device, system and equipment
Walker Internet security
Mathur et al. Securing routing in open networks using secure traceroute
Tommasi et al. COTIIP: a new covert channel based on incomplete IP packets
He Recent developments in securing Internet routing protocols
Subramanian Decentralized security mechanisms for routing protocols
Morehart Evaluating the effectiveness of ip hopping via an address routing gateway
Ray et al. A Framework to Facilitate Forensic Investigation of Falsely Advertised BGP Routes
Esposito OIF Control Plane Logging and Auditing with Syslog
Strufe Resilient Networking

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PADMANABHAN, VENKATA N.;SIMON, DANIEL R.;REEL/FRAME:013306/0545;SIGNING DATES FROM 20020916 TO 20020917

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0001

Effective date: 20141014